{"updated":"2025-01-19T17:56:10.247010+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00211031","sets":["1164:4088:10494:10571"]},"path":["10571"],"owner":"44499","recid":"211031","title":["悪性Botnet包囲網におけるマイニングマルウェア検知のための特徴抽出の試行"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-05-06"},"_buckets":{"deposit":"f7dbcf23-f78b-4303-b7b0-7fd7ab391d6d"},"_deposit":{"id":"211031","pid":{"type":"depid","value":"211031","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"悪性Botnet包囲網におけるマイニングマルウェア検知のための特徴抽出の試行","author_link":["535481","535479","535482","535480"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"悪性Botnet包囲網におけるマイニングマルウェア検知のための特徴抽出の試行"},{"subitem_title":"Experimental Feature Extraction for Detecting Mining Malware in the Botnet Detecting Infrastructure","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IOT","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-05-06","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"福山大学"},{"subitem_text_value":"福山大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Fukuyama University","subitem_text_language":"en"},{"subitem_text_value":"Fukuyama University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/211031/files/IPSJ-IOT21053009.pdf","label":"IPSJ-IOT21053009.pdf"},"date":[{"dateType":"Available","dateValue":"2023-05-06"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT21053009.pdf","filesize":[{"value":"996.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"dfbb2ba8-9caf-46ff-b104-38628056c2da","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"村上, 順也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山之上, 卓"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Junya, Murakami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takashi, Yamanoue","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"マイニングマルウェアがマイニングを動作させたときの通信がマイニングウェアの通信と類似していると仮定し,マイニングの通信の性質を,wireshark で観測することにより,抽出した.この性質を使って,現在開発中の悪性 Botnet 包囲網によるマイニングマルウェアの通信が検出できる可能性があることを確認した.ここで,悪性 Botnet 包囲網で得られたデータの解析に R を用いている.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We discuss the possibility of detecting the mining malware communications using our botnet detecting infrastructure using beneficial botnet. We have used the features of mining malware communications for this detection. The features are collected by using Wireshark, by assuming that mining-ware communications are similar to the mining-malware communications.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"10","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-05-06","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"2021-IOT-53"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:12:13.608468+00:00","id":211031,"links":{}}